Overview
- Description
- Multiple directory traversal vulnerabilities in Trend Micro Smart Protection Server 2.5 before build 2200, 2.6 before build 2106, and 3.0 before build 1330 allow remote attackers to read and delete arbitrary files via the tmpfname parameter to (1) log_mgt_adhocquery_ajaxhandler.php, (2) log_mgt_ajaxhandler.php, (3) log_mgt_ajaxhandler.php or (4) tf parameter to wcs_bwlists_handler.php.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 9.1
- Impact score
- 5.2
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-22
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:trendmicro:smart_protection_server:2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6EDFD747-231F-4689-BCBD-F91377B5EB1C" }, { "criteria": "cpe:2.3:a:trendmicro:smart_protection_server:2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CF329471-F913-4F88-B5F8-CB0C088AA321" }, { "criteria": "cpe:2.3:a:trendmicro:smart_protection_server:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E74019C0-01AD-4C0F-9ADE-099D6D7C8013" } ], "operator": "OR" } ] } ]